Sciweavers

357 search results - page 11 / 72
» Distributed Attribute-Based Encryption
Sort
View
WWW
2005
ACM
14 years 9 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
ISW
1997
Springer
14 years 19 days ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 9 months ago
Distributed Paillier Plaintext Equivalence Test
Consider the following scenario with N + 2 parties, A, B, X1, X2,
Pei-Yih Ting, Xiao-Wei Huang
ITIIS
2010
129views more  ITIIS 2010»
13 years 3 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
AMC
2007
75views more  AMC 2007»
13 years 9 months ago
Fingerprint images encryption via multi-scroll chaotic attractors
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang